mitre / sandcat
A CALDERA plugin
☆65Updated last week
Alternatives and similar repositories for sandcat:
Users that are interested in sandcat are comparing it to the libraries listed below
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆124Updated 3 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆111Updated 2 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆69Updated 3 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- ☆42Updated 2 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- A CALDERA plugin☆75Updated 2 weeks ago
- An Ansible role for installing Cobalt Strike.☆76Updated 2 weeks ago
- Detect possible sysmon logging bypasses given a specific configuration☆108Updated 6 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆73Updated 2 years ago
- Splunk Dashboard for CobaltStrike logs☆87Updated 4 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Kerberoast Detection Script☆30Updated 4 months ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- Active C2 IoCs☆98Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆103Updated 2 years ago
- ☆53Updated 6 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- ☆12Updated last year
- BloodHound Data Scanner☆44Updated 4 years ago